Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011

  • 1,020 views
Uploaded on

Final version of Lavacon11 Lightning Talk presentation

Final version of Lavacon11 Lightning Talk presentation

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,020
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
8
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Ten Tips to Shockproof Your Use of Social Media Ben Woelk Policy and Awareness Analyst Rochester Institute of Technology ben.woelk@gmail.com @benwoelk
  • 2. Introduction • Everyone is a target • Organized crime funds the attacks 2
  • 3. Avert Labs Malware Research 3Retrieved July 24, 2009 from:http://www.avertlabs.com/research/blog/index.php/2009/07/22/malware-is-their-businessand-business-is-good/
  • 4. Tip # 1 Strong Passwords/Passphrases • Length more important than complexity It was a dark and stormy night becomes ItwasaDark215andStormyNight 4
  • 5. Password Safes 5
  • 6. Tip # 2 Keep up to date! • Operating Systems • Applications 6
  • 7. Tip #3 Use Security Software Layers of Security • Anti-Virus Protection • Firewall • Anti-Spyware Protection Don’t overlook mobile devices! 7
  • 8. Tip #4 Recognize Phishing/Scams 8
  • 9. Phishing Tips 9
  • 10. Tip #5 Use Social Networks SafelyDon’t:• Post personal information• Post schedules or whereabouts• Post inappropriate photoshttp://www.sileo.com/facebook-status-update-leads-to-robbery/ 10
  • 11. Phishing on Social Network Sites 11 http://www.markmonitor.com/download/bji/BrandjackingIndex-Spring2009.pdf
  • 12. Tip #6 Remember Who Else is There • Who else uses social networking? – Employers – Identity Thieves – Online Predators • Facebook Stalker (http://www.youtube.com/watch?v=wCh9bmg0zGg) 12
  • 13. What You Post Can Be Used To… • Make judgments about your character • Impersonate you to financial institutions • Monitor what you do and where you go 13
  • 14. Tip #7 Be wary of others Is this really your friend? • Just because it’s your friend’s account does not mean that it’s your friend! 14
  • 15. Tip #8 Search for your name • Do a vanity search • Set up a Google Alert 15
  • 16. Tip #9 Guard Your PersonalInformation! • Watch out for Facebook Applications!! – A 2008 study found that 90.7% of apps had access to private user data (only 9.3% actually used the data) 16
  • 17. Tip #10: Don’t Assume Privacy • Do you care if Facebook captures where you’ve been? 17
  • 18. Use Privacy Settings • Default settings are set to sharing information • Adjust Facebook privacy settings to help protect your identity • Show "limited friends" a cut-down version of your profile • Disable options, then open them one by onehttp://www.sophos.com/security/best-practice/facebook.html
  • 19. The First Line of Defense Stay alert—you will be the first to know if something goes wrong – Are you receiving odd communications from someone? – Is your computer sounding strange or slower than normal?
  • 20. Practice Digital Self Defense • Infosec Communicator blog • @benwoelk • @RIT_Infosec 20